(ISC)2 SecureLondon December 2013

As economies, society and businesses become ever more dependent on the Internet, understanding not only the current threat landscape, but also the potential impact of developing threats is crucial to security and ultimately business management. A review of current headlines suggests attackers continue to range from the idealistic hacker to the more sophisticated criminal or state-sponsored groups, while the cyber world continues to evolve as a preferred platform for social protest. Threat development is moving with technology development as blended attacks embrace mobile malware; and advanced persistent threats (APT) expand to include cloud providers within their sights. All the while, the target data becomes ever more accessible as online aggregators clear the path for social profiling. All broaden the potential impact of attack with targets –cloud providers, mobile devices, and Big Data social networks—delivering a bigger payload than ever before.

If we are to stay ahead of the trends, we must understand the strategy of the criminal, social and disgruntled element of society that is driving them. We must also keep an eye on the proliferation of cyber weaponry with the now infamous Flame attacks, suggesting we may be entering an era where we consider ‘striking back' at attackers.

The SecureLondon Conference brings together practitioners, researchers, industry and government experts, solution providers and other prominent figures to explore the scope and nature of the latest Emerging Threats & Trends to help us get ahead of the attackers. It is designed to arm delegates with the instincts for understanding how to anticipate and pre-empt attack, assess the adequacy of not only our defenses, but also the strategy behind them; and clarify the requirements for the analysis of risk.

Benefits of attending:• Stay ahead of ever changing cyber threats• Hear representatives from core stakeholders who will discuss the challenges in successfully adapting to future security needs• Extensive networking opportunities with your peers; fellow (ISC)2 members and prominent figures in Information Security• Meet with solution providers to compare and find out about the latest technology developments• Earn 8 CPEs

Introducing Women in Security

The Women in Security group is an exciting initiative formed by professionals of the Information Security field within the (ISC)2 London Chapter.

Mission

The mission of the group is to raise the profile of women in the information security industry.

Objectives

To achieve this mission the WiS group is utilizing the energy and professionalism of the chapter volunteers towards three objectives – encourage participation, facilitate networking and promote education.

Participation

Increase & enable participation of women in the ISC2 Chapter and the security field.

We encourage women participation in chapter activities including meetings, discussion panels and presentations. Building a supportive and trusted environment by getting to know each other. To do that the group is working on creating social events & security conferences targeted to women, meaning that the presentations are on topics that are interesting to women and are delivered from inspiring presenters in a supportive space and at convenient time and locations.

Networking

We want to create collaboration bridges with other Women Groups that have similar targets & agenda as ours. In this way we can achieve more by reusing good examples & learning from past experiences.

(ISC)2 WiS are in contact with other groups via conference calls and by creating events in collaboration. By sharing experience, resources and ideas we can put more energy towards the achievement of the common target and give our members the opportunity to create strong relationships.

Training & Continuous Education

Both the chapter and the group gather security professionals that are specialized at a variety of topics like pen testing, soft security, compliance e.t.c. Also we have a number of enthusiastic volunteers willing to organize training sessions or participate at them. So we are looking in organizing training sessions.

Membership

Every woman working or interested in the information security field is welcome to participate at the events and benefits of the group.

While the activities of this group are specific to women we welcome the participation of every Information Security professional who is interested in our activities.

Please let us know if you would like to receive information on events and opportunities by sending an email to
This email address is being protected from spambots. You need JavaScript enabled to view it.
.

Contact Us

Email address:
This email address is being protected from spambots. You need JavaScript enabled to view it.

Follow (ISC)²

Copyright 2012, International Information Systems Security Certification Consortium, Inc. (“(ISC)²), in website format and trade dress only. All Rights Reserved. (ISC)², CISSP, SSCP, CAP, ISSAP, ISSEP, ISSMP, CSSLP, and CBK are registered certification, service, and trademarks of (ISC)². Disclaimer: (ISC)²” does not own, operate, or moderate this website. All content of this site, exclusive of licensed trademarks or copyright, is the property of the designated (ISC)² Chapter organization, which is not owned, managed, or controlled by (ISC)² and operates independent of (ISC)².